Course unit
Last updated: 09/12/2019
EditThe aim of this open week is to analyse the functioning of a cryptographic accelerator in order to propose solutions for protection against fault attacks.
Presentation of the different technologies required:
There follows the application of a fault attack bench by “glitch” on the clock in order to find the secret AES key. Cryptoanalysis development is then covered.
If there is time, after the attack analysis and functioning of the cryptographic accelerator, students will think about applying counter measures able to detect or divert the attack.
Remarks: Development of the different procedures of:
Procedures for retrieving the key could be developed in interpreted languages (such as Perl, Ruby, Python, Matlab... ). To be defined when the time comes.
Glossary :
UART : Universal Asynchronous Receiver Transmitte
On completion of the unit, the student will be capable of: | Classification level | Priority |
---|
Percentage ratio of individual assessment | Percentage ratio of group assessment | ||||
---|---|---|---|---|---|
Written exam: | % | Project submission: | % | ||
Individual oral exam: | % | Group presentation: | % | ||
Individual presentation: | % | Group practical exercise: | % | ||
Individual practical exercise: | % | Group report: | % | ||
Individual report: | 100 | % | |||
Other(s): % |
Type of teaching activity | Content, sequencing and organisation |
---|